Sciweavers

886 search results - page 2 / 178
» Generalized Bezout Identity
Sort
View
TOCL
2012
235views Formal Methods» more  TOCL 2012»
11 years 10 months ago
Topological and Simplicial Models of Identity Types
racting these leads us to introduce the notion of a path object category. This is a relatively simple axiomatic framework, which is nonetheless sufficiently strong to allow the con...
Benno van den Berg, Richard Garner
ACMSE
2009
ACM
13 years 5 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
13 years 2 months ago
Estimation of general nonlinear state-space systems
This paper presents a novel approach to the estimation of a general class of dynamic nonlinear system models. The main contribution is the use of a tool from mathematical statistic...
Brett Ninness, Adrian Wills, Thomas B. Schön
CIA
2007
Springer
14 years 1 months ago
Trust Modeling with Context Representation and Generalized Identities
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Martin Rehák, Michal Pechoucek